US20090141661A1 - Residual traffic state for wireless networks - Google Patents
Residual traffic state for wireless networks Download PDFInfo
- Publication number
- US20090141661A1 US20090141661A1 US11/947,748 US94774807A US2009141661A1 US 20090141661 A1 US20090141661 A1 US 20090141661A1 US 94774807 A US94774807 A US 94774807A US 2009141661 A1 US2009141661 A1 US 2009141661A1
- Authority
- US
- United States
- Prior art keywords
- mobile station
- service type
- detecting
- traffic
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/27—Transitions between radio resource control [RRC] states
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0212—Power saving arrangements in terminal devices managed by the network, e.g. network or access point is master and terminal is slave
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
- H04W52/0229—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- This description relates to wireless networks.
- Mobile stations in wireless networks may sometimes transition to an idle state (or low power or sleep state) to conserve battery power during periods of inactivity.
- an idle state or low power or sleep state
- receiving or transmitting e.g., only one or two packets every few minutes, or low data rate transmissions, may prevent the mobile station from entering into idle state or low power mode. In such a case, the battery power may be quickly reduced.
- a method may include detecting a residual traffic pattern associated with a mobile station in a wireless network, and transitioning the mobile station from an active state to a residual traffic state based on the detecting.
- the transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL uplink
- an apparatus may include a controller, a memory coupled to the controller and a wireless transceiver coupled to the controller.
- the apparatus may be configured to detect a residual traffic pattern associated with a mobile station in a wireless network, and transition the mobile station from an active state to a residual traffic state based on the detecting.
- the transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL uplink
- a method may include detecting an active traffic pattern associated with a mobile station, and transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern.
- the transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL uplink
- An apparatus may include a controller, a memory and a wireless transceiver.
- the apparatus may be configured to detect an active traffic pattern associated with a mobile station, transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL uplink
- a method may include detecting, by a mobile station in a wireless network, a residual traffic pattern, sending, in response to the detecting, a state transition request from the mobile station to an infrastructure node to request a transition to a residual traffic state for the mobile station, receiving a message at the mobile station from the infrastructure node instructing the mobile station to enter a residual traffic state, and entering, by the mobile station, a residual traffic state.
- FIG. 1 is a block diagram of a wireless network according to an example embodiment.
- FIG. 2 is a state diagram illustrating operating states for a mobile station according to an example embodiment.
- FIG. 3 is a flow chart illustrating operation of a base station or other node according to an example embodiment.
- FIG. 4 is a flow chart illustrating operation of a base station or other node according to another example embodiment.
- FIG. 5 is a flow chart illustrating operation of a base station or other node according to yet another example embodiment.
- FIG. 6 is a block diagram of a wireless node according to an example embodiment.
- FIG. 7 is a flow chart illustrating operation of a wireless node according to an example embodiment.
- FIG. 1 is a block diagram of a wireless network 102 including a base station (BS) 104 and mobile stations (MS) 106 , 108 , 110 , according to an example embodiment.
- BS base station
- MS mobile stations
- Each of the MSs 106 , 108 , 110 may be associated with BS 104 , and may transmit data in an uplink direction to BS 104 , and may receive data in a downlink direction from BS 104 , for example.
- BS 104 base station
- MS 106 , 108 and 110 may be associated with BS 104 , and may transmit data in an uplink direction to BS 104 , and may receive data in a downlink direction from BS 104 , for example.
- BS 104 and three mobile stations MS 106 , 108 and 110
- any number of base stations and mobile stations may be provided in network 102 .
- mobile stations 106 , 108 and 110 may be coupled to base station 104 via relay stations or relay nodes, for example.
- a network controller or gateway 112 may be coupled to the base stations (e.g., BS 104 ) via wired or wireless links.
- network controller 112 if present, may provide control for one or more network tasks or functions, either for or in cooperation with one or more base stations in network 102 .
- network controller 112 and base station 104 may each be connected to a wired network, such as a Local Area Network, a Wide Area Network (WAN), the Internet, etc.
- WAN Wide Area Network
- FIG. 2 is a state diagram illustrating operating states for a mobile station according to an example embodiment.
- a mobile station may typically operate in an active state (also known as a full power mode), where the MS can perform all of its basic functions. However, in order to save or conserve battery power, the MS may transition to an idle state (also known as low power mode or power save mode), where many hardware blocks in the MS may have power turned off. For example, the MS may periodically wake from idle state to receive a beacon to determine if there is data to be transmitted to it from a base station. If there is no data to be received by the MS, then the MS may go back to idle state to conserve power.
- an active state also known as a full power mode
- the MS may transition to an idle state (also known as low power mode or power save mode), where many hardware blocks in the MS may have power turned off. For example, the MS may periodically wake from idle state to receive a beacon to determine if there is data to be transmitted to it from a base station. If there is no data to be received by the MS, then
- the MS remains in active state to receive and process the data.
- the MS may transition to an idle state or power save mode.
- a small amount of data (e.g., one or two packets) transmitted to or from the MS may in some cases prevent the MS from entering into idle state.
- residual traffic transmitted to or from a MS may amount to a relatively small data rate or only a few packets, but may prevent the MS from entering into idle state.
- Residual traffic may include background activity of programs or applications and operating system activity, for example. For example, after all user applications (e.g., HTTP web browser, email program, Adobe Acrobat program, Word editor program) have been closed (or no longer used by the user) on a MS, the data that may continue to be transmitted by the MS to the BS may be considered to be residual traffic.
- This residual traffic may include, for example, network traffic generated by a network disk drive, an antivirus program that periodically checks the network for updates, an Acrobat or other program that periodically wakes up and checks for network updates, a program that periodically receives or requests and receives an updated time (e.g., from a universal clock), an operating system that periodically checks a network for OS updates, etc.
- the residual traffic may include, for example, either data transmitted from the MS and/or data received by the MS. In the case of received data, residual traffic may be either solicited (requested) or unsolicited.
- a BS may detect a residual traffic pattern for a MS, and may transition (or change) the MS from active state 210 to a residual traffic state 230 .
- a residual traffic pattern may be a pattern of traffic associated with the MS (e.g., either to or from the MS) that is or appears to be at least primarily residual type traffic.
- the BS may detect a residual traffic pattern for a MS based on an amount of traffic to or from the MS, where an amount of traffic to or from the MS that is below a threshold may indicate (primarily) residual traffic.
- the BS may detect an amount of traffic transmitted by the MS to the BS and/or the amount of traffic transmitted by the BS (or stored in BS buffers waiting for transmission to the MS), and compare this amount of traffic over a period of time to a threshold. If the amount of traffic to and/or from the MS is less than a threshold, then this may be a residual traffic pattern.
- the BS may detect a residual traffic pattern for the MS by detecting the types of traffic transmitted to or from the MS, and confirming that these detected types of traffic (either to or from the MS) are not associated with active user applications or active user activity (e.g., web browsing, sending email, file transfer).
- the BS may, for example, detect the type of traffic associated with each (or one or more) packets transmitted from or to the MS. For example, if only (or primarily) OS traffic (e.g., requesting or periodically checking for OS updates) is detected from the MS, then this may be an example residual traffic pattern.
- OS traffic e.g., requesting or periodically checking for OS updates
- Other ways or techniques may be used to determine or detect a residual traffic pattern for a MS.
- transitioning the MS to a residual traffic state may include the BS buffering DL data directed to the MS until an amount of DL data for the MS reaches (or exceeds) a threshold, or until a timer expires. This may allow the MS to receive larger, but less frequent, DL transmissions from the BS. This may, at least in some cases, result in improved conservation of battery power for the MS, for example.
- the BS transitioning the MS to a residual traffic state may also include changing the uplink (UL) data service (or MAC QoS) for the MS, e.g., to a data service that may be more power (or battery) efficient while still being able to handle a low data rate transmissions from the MS that may be associated with residual traffic.
- a BS may transition a MS to residual traffic state by the BS sending (or transmitting) a change uplink (UL) data service message to the MS to change the UL data service for the MS from a first UL data service (e.g., currently being used by the MS in active state) to a second UL data service type (which may be more power efficient than the first data service type).
- UL data services may include data service types where the MS is required to solicit or request UL transmission resources, by polling or sending a request to the BS.
- These service types that involve a solicited resource grant from the BS may include IEEE 802.16 Best Effort, real time polling service (rtps), non real time polling service, and others.
- the 802.16 service types or scheduling types are merely used as examples, and the disclosure and claims are not limited thereto.
- UL data service types that may involve unsolicited resource grants, which may be considered more power efficient (than the types that provide solicited resource grants), and thus may save battery power in some cases, since there is no need for the MS to poll or request the BS for UL data resources every time the MS would like to transmit data to the BS.
- these unsolicited resource grants may provide a grant every n frames, or provide a given UL bit rate, etc., which may be used for low rate residual UL traffic from the MS, for example.
- an IEEE 802.16 unsolicited grant service may provide unsolicited fixed size resource grants at periodic intervals (e.g., every n frames).
- extended real time polling service may provide unsolicited dynamic size resource grants at periodic intervals, where the size of the resource grant may be adjusted (or at least a change requested) based on a resource (or bandwidth) change request message sent from the MS to the BS.
- the BS may measure or determine the amount of residual traffic (or residual traffic load) associated with a MS, and may adjust or scale the UL resources provided to the MS based on the residual traffic load or demand. For example, a BS may measure the number of packets or average bit rate for traffic transmitted to or from a MS while in residual traffic state 230 . The BS may then adjust or adapt one or more parameters (e.g., bandwidth, data rate, grant size (e.g., in bits), grant interval, or other parameter) of the UL data service (e.g., ertPS or UGS) provided to the MS to match the average (or alternatively match the minimum or maximum) residual traffic data rate associated with the MS (while in the residual traffic state), for example.
- the MS may request an increase (or decrease) in the UL resources, and the BS may respond by granting additional (or fewer) resources to the MS while in residual traffic state.
- the BS may scale or adjust the UL resources allocated or granted to the MS by sending the MS a resource adjustment message.
- This resource adjustment message may be sent by the BS to the MS based on a measured or detected usage of resources, or amount of residual traffic, or based on a change in the MS's usage of the granted resources (e.g., using all the resources, or not using all the granted resources).
- a BS may increase the grant size and/or decrease a grant interval if more than a threshold bandwidth or resources are used by the MS during residual traffic state, or if the MS continues to request more resources while in residual traffic state.
- the MS may request additional UL resources by sending to the BS, for example, an in band bandwidth request in an ertPS header, or a dynamic service change (DSC) message for UGS or other message, as examples.
- the BS may increase the grant size and decrease the grant interval to meet this increased demand. For example, if the MS is using all (or a threshold) of the UL resources provided by the BS, then the BS may increase these resources.
- the MS may request additional resources, e.g., by using the Bandwidth Request field in MAC (medium access control) header.
- the BS may decrease the resources as the residual traffic or demand for resources during residual traffic state decreases.
- the BS may detect an active traffic pattern associated with the MS, and then may transition the MS from residual traffic state to active state.
- the active traffic pattern may be indicated based on, for example, a volume of traffic transmitted to or from the MS, or based on the type of traffic transmitted to or from the MS, or an increase in resource requests from the MS (e.g., that exceeds a threshold). For example, an active traffic pattern may be indicated if the amount of traffic to and/or from the MS over a period of time is greater than a threshold, or an amount of resource requests (or requested resources) from the MS exceeds a threshold. Or, an active traffic pattern may be indicated by determining that the type of traffic to or from the MS indicates an active traffic pattern.
- an active traffic pattern may be indicated by the BS detecting the presence of traffic (e.g., packets) from user applications that are running on the MS, such as downloading web pages via a web browser, transmission or receipt of voice over IP (VoIP) packets, etc.
- traffic e.g., packets
- VoIP voice over IP
- the BS may transition the MS back to an active state, so that the MS may better handle the increased traffic load. For example, as part of transitioning the MS back to active state, the BS may no longer buffer data directed to the MS (e.g., until threshold amount of data is buffered or timer expires), but may simply forward data to the MS as it is received (with temporary buffering as required). Also, the BS may send the MS a change UL data service message to change the UL data service.
- the BS in response to detecting an active traffic pattern, may change the UL data service back to a service that may better accommodate a heavier data flow, but may be less power efficient, such as a Best Effort (BE) service, or other service that may provide solicited resource grants (e.g., resources provided in response to a request from the MS), for example.
- BE Best Effort
- DL data (directed to MS) in BS buffer with residual resources granted to MS would result in latency that exceeds a threshold (e.g., >100 ms). This may indicate an active traffic pattern;
- More than X % e.g., more than 90%
- X % e.g., more than 90%
- Amount of DL traffic to MS or UL traffic from MS over a period of time is less than a threshold. This may indicate a residual traffic pattern.
- MS buffer state is relatively full (MS buffer exceeds a threshold, may indicate active traffic pattern), or relatively empty (MS buffer is less than a threshold may indicate residual traffic pattern).
- FIG. 3 is a flow chart illustrating operation of a BS or other infrastructure node according to an example embodiment.
- the MS is in an active state.
- the BS determines if a residual traffic pattern is present or detected (or primarily residual traffic is detected). If a residual traffic pattern is not present or detected, then the flow returns to operation 304 .
- Operation 308 may include the BS changing the UL data service type for the MS to a more power efficient service type (e.g., which may use unsolicited resource grants). This may include changing the UL service state for the MS to UGS or ertPS, as examples.
- the BS may also adjust one or more parameters associated with this new UL data service type, e.g., by scaling the granted UL resources to the residual traffic or residual traffic demand.
- the BS determines whether an active traffic pattern is present. If an active traffic pattern is not present, then at 312 the BS determines whether service parameters need to be adjusted, and if so, these parameters may be adjusted at 314 , where the bandwidth, grant interval, data rate, grant size, or other service parameter(s), for example, may be adjusted by the BS to scale the UL resource to the residual traffic or residual traffic demand. The flow then proceeds back to 310 .
- the BS transitions the MS to active state at 306 , e.g., by changing the MS UL data service type back to the original state, e.g., Best Effort or other service type that may typically be used for active state. Flow then proceeds back to 304 .
- FIG. 4 is a flow chart illustrating operation of a base station or other node according to an example embodiment.
- Operation 410 may include detecting a residual traffic pattern associated with a mobile station in a wireless network.
- Operation 420 may include transitioning the mobile station from an active state to a residual traffic state based on the detecting, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL change uplink
- operation 410 may include detecting only residual traffic to or from the mobile station. In an example embodiment, operation 410 may include detecting an amount of traffic to or from the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic transmitted from the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic transmitted to the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic directed to the mobile station that is stored in buffers at base station that is less than a threshold. In an example embodiment, the second UL service type may provide unsolicited UL resource grants to the mobile station at periodic intervals, and the first UL service type may provide resource grants to the mobile station upon solicitation or request from the mobile station.
- the sending a change uplink (UL) data service message to the mobile station of operation 420 may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type, the second service type including a data service where a base station provides unsolicited resource grants to the mobile station at periodic intervals.
- UL change uplink
- the second UL service type may provide at least one of 1) unsolicited fixed size resource grants at periodic intervals, or 2) unsolicited dynamic size resource grants at periodic intervals where the size of the dynamic size resource grant may be adjusted based on a resource change request from the mobile station.
- the first UL service type may include a Best Effort service type
- the second UL service type may include one of an extended real time polling service (Extended rtPS) or an uplink grant service (UGS).
- Extended rtPS extended real time polling service
- UMS uplink grant service
- the transitioning (operation 420 ) may further include buffering at least some downlink (DL) data directed to the mobile station until an amount of buffered data reaches a threshold or a time limit is reached.
- DL downlink
- the flow chart of FIG. 4 may further include measuring an amount of residual traffic associated with the mobile station, and adjusting one or more parameters (e.g., a bit or data rate, resource grant size, or period/interval between resource grants) associated with the UL data service for the mobile station at least while the mobile station is in the residual traffic state.
- one or more parameters e.g., a bit or data rate, resource grant size, or period/interval between resource grants
- the flow chart of FIG. 4 may further include detecting an active traffic pattern associated with the mobile station, transitioning the mobile station from the residual traffic state to the active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from the second UL service type to the first UL service type.
- the detecting an active traffic pattern associated with the mobile station may include detecting an amount of traffic to or from the mobile station over a period of time is greater than a threshold amount.
- the detecting an active traffic pattern associated with the mobile station may include detecting an amount of active traffic to or from the mobile station over a period of time is greater than a threshold amount.
- an apparatus may include a controller, a memory coupled to the controller, and a wireless transceiver coupled to the controller.
- the apparatus may be configured to detect a residual traffic pattern associated with a mobile station in a wireless network, and transition the mobile station from an active state to a residual traffic state based on the detected residual traffic pattern.
- the transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- the apparatus may be (or may be provided within) a base station or access point, a network controller, a gateway, or other infrastructure node.
- FIG. 5 is a flow chart illustrating operation of a base station or other node according to an example embodiment.
- Operation 510 may include detecting an active traffic pattern associated with a mobile station.
- Operation 520 may include transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL change uplink
- the sending of operation 520 may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type, the first UL service type providing unsolicited UL resource grants to the mobile station at periodic intervals, and the second UL service type providing resource grants to the mobile station upon solicitation or request from the mobile station.
- UL uplink
- the second UL service type of the flowchart of FIG. 5 may include a Best Effort service type, and the first UL service type includes one of an extended real time polling service (Extended rtPS) or an uplink grant service (UGS).
- Extended rtPS extended real time polling service
- UMS uplink grant service
- operation 510 may include detecting an amount of traffic to or from the mobile station over a period of time is greater than a threshold amount, or detecting an amount of active traffic to or from the mobile station over a period of time is greater than a threshold amount.
- an apparatus may be provided.
- the apparatus may include a controller, a memory and a wireless transceiver.
- the apparatus may be configured to detect an active traffic pattern associated with a mobile station, transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- the apparatus may be (or may be provided within) a base station, access point, a network controller or gateway, or other infrastructure node.
- network controller 112 or gateway may control or coordinate a number of functions or tasks described above. For example, network controller 112 may detect a residual traffic pattern and transition the MS to residual traffic state, update UL service parameters, detect an active traffic state, and transition the MS back to active state, for example. These measurements by network controller 112 may be based on data provided by the BS, or by the network controller receiving the wireless communications between BS and MS, for example.
- a mobile station may participate in a detection of a residual traffic pattern, state transitioning (e.g., transitioning to a residual traffic state), and adaptation of parameters (e.g., data rate, resource grant size, period or interval between resource grants) for an UL data service based on changing traffic load.
- state transitioning e.g., transitioning to a residual traffic state
- adaptation of parameters e.g., data rate, resource grant size, period or interval between resource grants
- the mobile station may measure its traffic load (e.g., traffic to or from the MS), an amount of data waiting in the MS's buffers for transmission, or other parameters that may indicate a residual traffic pattern or an active traffic pattern for the MS.
- the MS may detect a residual traffic pattern, and then send a state transition request to an infrastructure node (e.g., to a BS or network controller, gateway or other node).
- the infrastructure node may, for example, also measure traffic load to or from the MS, and may confirm that transitioning the MS to a residual traffic state would be appropriate.
- a BS may make this decision (whether to transition the MS to residual traffic state) or may forward the state transition request to a gateway or network controller which would make this decision to transition the MS to a residual traffic state.
- the infrastructure node may then send a reply message confirming or instructing the MS to transition to a residual traffic state.
- This reply may be or may include, for example, a change uplink data service message instructing the MS to change UL data service from a first UL service type to a second UL service type.
- the infrastructure node (for example, a BS) may buffer data or packets directed to the MS while the MS is in a residual traffic state, and the MS may also buffer data to be transmitted while it is in a residual traffic state.
- the MS may continue to measure traffic load, and continue to measure the amount of buffered data in its buffers awaiting transmission.
- the MS may send a request to the infrastructure node to or adjust (e.g., either increase or decrease) one or more parameters associated with the UL data service, or other communication parameters, e.g., to accommodate the changed traffic load at the MS.
- the MS may detect an active traffic pattern (e.g., where the amount of traffic to or from the MS and/or an amount of data in buffers awaiting transmission by the MS exceeds a threshold, or other active traffic pattern).
- the MS may send the infrastructure node a state transition request to request a transition back to active state for the MS.
- the infrastructure node may, for example, after confirming that such transition would be appropriate, may send a reply message confirming or instructing the MS to transition back to active state.
- the infrastructure node may send a change UL data service message instructing the MS to switch back to the first service type that may typically be used in an active state.
- FIG. 7 is a flow chart illustrating operation of a wireless node, such as a mobile station according to an example embodiment.
- the method may include detecting ( 710 ), by a mobile station in a wireless network, a residual traffic pattern, sending ( 720 ), in response to the detecting, a state transition request from the mobile station to an infrastructure node to request a transition to a residual traffic state for the mobile station.
- the method may also include receiving ( 730 ) a message at the mobile station from the infrastructure node instructing the mobile station to enter a residual traffic state, and entering ( 740 ), by the mobile station, a residual traffic state.
- the detecting ( 710 ) may include detecting, by a mobile station, a residual traffic pattern associated with a mobile station in a wireless network comprises detecting an amount of traffic transmitted from or received by the mobile station is less than a threshold amount over a period of time.
- the receiving ( 730 ) a message may include receiving a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- UL uplink
- FIG. 6 is a block diagram of a wireless node according to an example embodiment.
- the wireless node 600 may include a wireless transceiver 602 , and a controller 604 , and a memory 606 .
- some operations illustrated and/or described herein, may be performed by a controller 604 , under control of software or firmware.
- a storage medium may be provided that includes stored instructions, which when executed by a controller or processor may result in a controller, or processor, performing one or more of the functions or tasks described above.
- Implementations of the various techniques described herein may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Implementations may implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, a data processing apparatus, e.g., a programmable processor, a computer, or multiple computers.
- a data processing apparatus e.g., a programmable processor, a computer, or multiple computers.
- a computer program such as the computer program(s) described above, can be written in any form of programming language, including compiled or interpreted languages, and can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
- a computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- Method steps may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method steps also may be performed by, and an apparatus may be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
- FPGA field programmable gate array
- ASIC application-specific integrated circuit
- processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
- a processor will receive instructions and data from a read-only memory or a random access memory or both.
- Elements of a computer may include at least one processor for executing instructions and one or more memory devices for storing instructions and data.
- a computer also may include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks.
- Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
- semiconductor memory devices e.g., EPROM, EEPROM, and flash memory devices
- magnetic disks e.g., internal hard disks or removable disks
- magneto-optical disks e.g., CD-ROM and DVD-ROM disks.
- the processor and the memory may be supplemented by, or incorporated in, special purpose logic circuitry.
- implementations may be implemented on a computer having a display device, e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer.
- a display device e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor
- keyboard and a pointing device e.g., a mouse or a trackball
- Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
- Implementations may be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation, or any combination of such back-end, middleware, or front-end components.
- Components may be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), e.g., the Internet.
- LAN local area network
- WAN wide area network
Abstract
Description
- This description relates to wireless networks.
- Mobile stations in wireless networks may sometimes transition to an idle state (or low power or sleep state) to conserve battery power during periods of inactivity. However, in some cases, even receiving or transmitting, e.g., only one or two packets every few minutes, or low data rate transmissions, may prevent the mobile station from entering into idle state or low power mode. In such a case, the battery power may be quickly reduced.
- According to an example embodiment, a method may include detecting a residual traffic pattern associated with a mobile station in a wireless network, and transitioning the mobile station from an active state to a residual traffic state based on the detecting. The transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- In another example embodiment, an apparatus may include a controller, a memory coupled to the controller and a wireless transceiver coupled to the controller. The apparatus may be configured to detect a residual traffic pattern associated with a mobile station in a wireless network, and transition the mobile station from an active state to a residual traffic state based on the detecting. The transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- According to another example embodiment, a method may include detecting an active traffic pattern associated with a mobile station, and transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern. The transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- An apparatus may include a controller, a memory and a wireless transceiver. The apparatus may be configured to detect an active traffic pattern associated with a mobile station, transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
- In another example embodiment, a method may include detecting, by a mobile station in a wireless network, a residual traffic pattern, sending, in response to the detecting, a state transition request from the mobile station to an infrastructure node to request a transition to a residual traffic state for the mobile station, receiving a message at the mobile station from the infrastructure node instructing the mobile station to enter a residual traffic state, and entering, by the mobile station, a residual traffic state.
- The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features will be apparent from the description and drawings, and from the claims.
-
FIG. 1 is a block diagram of a wireless network according to an example embodiment. -
FIG. 2 is a state diagram illustrating operating states for a mobile station according to an example embodiment. -
FIG. 3 is a flow chart illustrating operation of a base station or other node according to an example embodiment. -
FIG. 4 is a flow chart illustrating operation of a base station or other node according to another example embodiment. -
FIG. 5 is a flow chart illustrating operation of a base station or other node according to yet another example embodiment. -
FIG. 6 is a block diagram of a wireless node according to an example embodiment. -
FIG. 7 is a flow chart illustrating operation of a wireless node according to an example embodiment. - Referring to the Figures in which like numerals indicate like elements,
FIG. 1 is a block diagram of awireless network 102 including a base station (BS) 104 and mobile stations (MS) 106, 108, 110, according to an example embodiment. Each of theMSs BS 104, and may transmit data in an uplink direction toBS 104, and may receive data in a downlink direction fromBS 104, for example. Although only one BS 104 and three mobile stations (MS 106, 108 and 110) are shown, any number of base stations and mobile stations may be provided innetwork 102. Also, although not shown,mobile stations base station 104 via relay stations or relay nodes, for example. A network controller orgateway 112 may be coupled to the base stations (e.g., BS 104) via wired or wireless links. In an example embodiment,network controller 112, if present, may provide control for one or more network tasks or functions, either for or in cooperation with one or more base stations innetwork 102. Although not shown,network controller 112 andbase station 104 may each be connected to a wired network, such as a Local Area Network, a Wide Area Network (WAN), the Internet, etc. -
FIG. 2 is a state diagram illustrating operating states for a mobile station according to an example embodiment. A mobile station may typically operate in an active state (also known as a full power mode), where the MS can perform all of its basic functions. However, in order to save or conserve battery power, the MS may transition to an idle state (also known as low power mode or power save mode), where many hardware blocks in the MS may have power turned off. For example, the MS may periodically wake from idle state to receive a beacon to determine if there is data to be transmitted to it from a base station. If there is no data to be received by the MS, then the MS may go back to idle state to conserve power. If the beacon (e.g., from the BS) indicates that data will be transmitted to the MS in the next data frame, then the MS remains in active state to receive and process the data. This is merely an example, and other power save implementations may be used where the MS may transition to an idle state or power save mode. - However, in some cases, even a small amount of data (e.g., one or two packets) transmitted to or from the MS may in some cases prevent the MS from entering into idle state. For example, residual traffic transmitted to or from a MS may amount to a relatively small data rate or only a few packets, but may prevent the MS from entering into idle state. Residual traffic may include background activity of programs or applications and operating system activity, for example. For example, after all user applications (e.g., HTTP web browser, email program, Adobe Acrobat program, Word editor program) have been closed (or no longer used by the user) on a MS, the data that may continue to be transmitted by the MS to the BS may be considered to be residual traffic. This residual traffic may include, for example, network traffic generated by a network disk drive, an antivirus program that periodically checks the network for updates, an Acrobat or other program that periodically wakes up and checks for network updates, a program that periodically receives or requests and receives an updated time (e.g., from a universal clock), an operating system that periodically checks a network for OS updates, etc. The residual traffic may include, for example, either data transmitted from the MS and/or data received by the MS. In the case of received data, residual traffic may be either solicited (requested) or unsolicited.
- Therefore, according to an example embodiment, a BS may detect a residual traffic pattern for a MS, and may transition (or change) the MS from
active state 210 to aresidual traffic state 230. For example, a residual traffic pattern may be a pattern of traffic associated with the MS (e.g., either to or from the MS) that is or appears to be at least primarily residual type traffic. For example, the BS may detect a residual traffic pattern for a MS based on an amount of traffic to or from the MS, where an amount of traffic to or from the MS that is below a threshold may indicate (primarily) residual traffic. For example, the BS may detect an amount of traffic transmitted by the MS to the BS and/or the amount of traffic transmitted by the BS (or stored in BS buffers waiting for transmission to the MS), and compare this amount of traffic over a period of time to a threshold. If the amount of traffic to and/or from the MS is less than a threshold, then this may be a residual traffic pattern. - In another example embodiment, the BS may detect a residual traffic pattern for the MS by detecting the types of traffic transmitted to or from the MS, and confirming that these detected types of traffic (either to or from the MS) are not associated with active user applications or active user activity (e.g., web browsing, sending email, file transfer). In this case, the BS may, for example, detect the type of traffic associated with each (or one or more) packets transmitted from or to the MS. For example, if only (or primarily) OS traffic (e.g., requesting or periodically checking for OS updates) is detected from the MS, then this may be an example residual traffic pattern. Other ways or techniques may be used to determine or detect a residual traffic pattern for a MS.
- After a BS detects a residual traffic pattern for a MS, the BS may transition the MS from an active state to residual traffic state 203. In an example embodiment, transitioning the MS to a residual traffic state may include the BS buffering DL data directed to the MS until an amount of DL data for the MS reaches (or exceeds) a threshold, or until a timer expires. This may allow the MS to receive larger, but less frequent, DL transmissions from the BS. This may, at least in some cases, result in improved conservation of battery power for the MS, for example.
- The BS transitioning the MS to a residual traffic state may also include changing the uplink (UL) data service (or MAC QoS) for the MS, e.g., to a data service that may be more power (or battery) efficient while still being able to handle a low data rate transmissions from the MS that may be associated with residual traffic. A BS may transition a MS to residual traffic state by the BS sending (or transmitting) a change uplink (UL) data service message to the MS to change the UL data service for the MS from a first UL data service (e.g., currently being used by the MS in active state) to a second UL data service type (which may be more power efficient than the first data service type).
- In an example embodiment, UL data services may include data service types where the MS is required to solicit or request UL transmission resources, by polling or sending a request to the BS. These service types that involve a solicited resource grant from the BS may include IEEE 802.16 Best Effort, real time polling service (rtps), non real time polling service, and others. The 802.16 service types or scheduling types are merely used as examples, and the disclosure and claims are not limited thereto.
- On the other hand, there are UL data service types that may involve unsolicited resource grants, which may be considered more power efficient (than the types that provide solicited resource grants), and thus may save battery power in some cases, since there is no need for the MS to poll or request the BS for UL data resources every time the MS would like to transmit data to the BS. Rather, these unsolicited resource grants may provide a grant every n frames, or provide a given UL bit rate, etc., which may be used for low rate residual UL traffic from the MS, for example. For example, an IEEE 802.16 unsolicited grant service (UGS) may provide unsolicited fixed size resource grants at periodic intervals (e.g., every n frames). Similarly, extended real time polling service (extended rtPS) may provide unsolicited dynamic size resource grants at periodic intervals, where the size of the resource grant may be adjusted (or at least a change requested) based on a resource (or bandwidth) change request message sent from the MS to the BS.
- In addition, the BS may measure or determine the amount of residual traffic (or residual traffic load) associated with a MS, and may adjust or scale the UL resources provided to the MS based on the residual traffic load or demand. For example, a BS may measure the number of packets or average bit rate for traffic transmitted to or from a MS while in
residual traffic state 230. The BS may then adjust or adapt one or more parameters (e.g., bandwidth, data rate, grant size (e.g., in bits), grant interval, or other parameter) of the UL data service (e.g., ertPS or UGS) provided to the MS to match the average (or alternatively match the minimum or maximum) residual traffic data rate associated with the MS (while in the residual traffic state), for example. In other embodiments, the MS may request an increase (or decrease) in the UL resources, and the BS may respond by granting additional (or fewer) resources to the MS while in residual traffic state. - In an example embodiment, the BS may scale or adjust the UL resources allocated or granted to the MS by sending the MS a resource adjustment message. This resource adjustment message may be sent by the BS to the MS based on a measured or detected usage of resources, or amount of residual traffic, or based on a change in the MS's usage of the granted resources (e.g., using all the resources, or not using all the granted resources). For example, a BS may increase the grant size and/or decrease a grant interval if more than a threshold bandwidth or resources are used by the MS during residual traffic state, or if the MS continues to request more resources while in residual traffic state. The MS may request additional UL resources by sending to the BS, for example, an in band bandwidth request in an ertPS header, or a dynamic service change (DSC) message for UGS or other message, as examples. Thus, as more residual traffic is detected (or more resources are used or requested by the MS), the BS may increase the grant size and decrease the grant interval to meet this increased demand. For example, if the MS is using all (or a threshold) of the UL resources provided by the BS, then the BS may increase these resources. Also, the MS may request additional resources, e.g., by using the Bandwidth Request field in MAC (medium access control) header. Likewise, the BS may decrease the resources as the residual traffic or demand for resources during residual traffic state decreases.
- In addition, the BS may detect an active traffic pattern associated with the MS, and then may transition the MS from residual traffic state to active state. The active traffic pattern may be indicated based on, for example, a volume of traffic transmitted to or from the MS, or based on the type of traffic transmitted to or from the MS, or an increase in resource requests from the MS (e.g., that exceeds a threshold). For example, an active traffic pattern may be indicated if the amount of traffic to and/or from the MS over a period of time is greater than a threshold, or an amount of resource requests (or requested resources) from the MS exceeds a threshold. Or, an active traffic pattern may be indicated by determining that the type of traffic to or from the MS indicates an active traffic pattern. For example, an active traffic pattern may be indicated by the BS detecting the presence of traffic (e.g., packets) from user applications that are running on the MS, such as downloading web pages via a web browser, transmission or receipt of voice over IP (VoIP) packets, etc. These are merely some examples of an active traffic pattern and the disclosure is not limited thereto.
- In response to detecting an active traffic pattern, the BS may transition the MS back to an active state, so that the MS may better handle the increased traffic load. For example, as part of transitioning the MS back to active state, the BS may no longer buffer data directed to the MS (e.g., until threshold amount of data is buffered or timer expires), but may simply forward data to the MS as it is received (with temporary buffering as required). Also, the BS may send the MS a change UL data service message to change the UL data service. In an example embodiment, in response to detecting an active traffic pattern, the BS may change the UL data service back to a service that may better accommodate a heavier data flow, but may be less power efficient, such as a Best Effort (BE) service, or other service that may provide solicited resource grants (e.g., resources provided in response to a request from the MS), for example.
- The following list provides some example situations, that may cause a transition between active state and residual traffic state (e.g., which may indicate either an active traffic pattern or a residual traffic pattern):
- 1) DL data (directed to MS) in BS buffer exceeds a threshold N times over a certain period of time. This may indicate an active traffic pattern;
- 2) DL data (directed to MS) in BS buffer is less than a lower threshold over a certain period of time. This may indicate a residual traffic pattern;
- 3) DL data (directed to MS) in BS buffer with residual resources granted to MS would result in latency that exceeds a threshold (e.g., >100 ms). This may indicate an active traffic pattern;
- 4) More than X % (e.g., more than 90%) of the resources granted to MS in residual traffic state are used by MS over a period of time. This may indicate an active traffic pattern;
- 5) DL data flow from BS to MS that exceeds a threshold, or by BS detecting traffic to or from MS of a type that is associated with active user applications. This may indicate an active traffic pattern.
- 6) Amount of DL traffic to MS or UL traffic from MS over a period of time is less than a threshold. This may indicate a residual traffic pattern.
- 7) MS buffer state is relatively full (MS buffer exceeds a threshold, may indicate active traffic pattern), or relatively empty (MS buffer is less than a threshold may indicate residual traffic pattern).
-
FIG. 3 is a flow chart illustrating operation of a BS or other infrastructure node according to an example embodiment. At 302, the MS is in an active state. At 304, the BS determines if a residual traffic pattern is present or detected (or primarily residual traffic is detected). If a residual traffic pattern is not present or detected, then the flow returns tooperation 304. - If a residual traffic pattern is detected or present at 304, the BS transitions the MS to a residual traffic state at 308.
Operation 308 may include the BS changing the UL data service type for the MS to a more power efficient service type (e.g., which may use unsolicited resource grants). This may include changing the UL service state for the MS to UGS or ertPS, as examples. The BS may also adjust one or more parameters associated with this new UL data service type, e.g., by scaling the granted UL resources to the residual traffic or residual traffic demand. - At 310, the BS determines whether an active traffic pattern is present. If an active traffic pattern is not present, then at 312 the BS determines whether service parameters need to be adjusted, and if so, these parameters may be adjusted at 314, where the bandwidth, grant interval, data rate, grant size, or other service parameter(s), for example, may be adjusted by the BS to scale the UL resource to the residual traffic or residual traffic demand. The flow then proceeds back to 310.
- If at 310, an active traffic pattern is detected, then the BS transitions the MS to active state at 306, e.g., by changing the MS UL data service type back to the original state, e.g., Best Effort or other service type that may typically be used for active state. Flow then proceeds back to 304.
-
FIG. 4 is a flow chart illustrating operation of a base station or other node according to an example embodiment.Operation 410 may include detecting a residual traffic pattern associated with a mobile station in a wireless network.Operation 420 may include transitioning the mobile station from an active state to a residual traffic state based on the detecting, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type. - In an example embodiment,
operation 410 may include detecting only residual traffic to or from the mobile station. In an example embodiment,operation 410 may include detecting an amount of traffic to or from the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic transmitted from the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic transmitted to the mobile station is less than a threshold amount over a period of time, or detecting an amount of traffic directed to the mobile station that is stored in buffers at base station that is less than a threshold. In an example embodiment, the second UL service type may provide unsolicited UL resource grants to the mobile station at periodic intervals, and the first UL service type may provide resource grants to the mobile station upon solicitation or request from the mobile station. - In an example embodiment, the sending a change uplink (UL) data service message to the mobile station of
operation 420 may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type, the second service type including a data service where a base station provides unsolicited resource grants to the mobile station at periodic intervals. - In an example embodiment, the second UL service type may provide at least one of 1) unsolicited fixed size resource grants at periodic intervals, or 2) unsolicited dynamic size resource grants at periodic intervals where the size of the dynamic size resource grant may be adjusted based on a resource change request from the mobile station.
- In an example embodiment, the first UL service type may include a Best Effort service type, and the second UL service type may include one of an extended real time polling service (Extended rtPS) or an uplink grant service (UGS).
- In an example embodiment, the transitioning (operation 420) may further include buffering at least some downlink (DL) data directed to the mobile station until an amount of buffered data reaches a threshold or a time limit is reached.
- The flow chart of
FIG. 4 may further include measuring an amount of residual traffic associated with the mobile station, and adjusting one or more parameters (e.g., a bit or data rate, resource grant size, or period/interval between resource grants) associated with the UL data service for the mobile station at least while the mobile station is in the residual traffic state. - The flow chart of
FIG. 4 may further include detecting an active traffic pattern associated with the mobile station, transitioning the mobile station from the residual traffic state to the active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from the second UL service type to the first UL service type. In an example embodiment, the detecting an active traffic pattern associated with the mobile station may include detecting an amount of traffic to or from the mobile station over a period of time is greater than a threshold amount. Or, the detecting an active traffic pattern associated with the mobile station may include detecting an amount of active traffic to or from the mobile station over a period of time is greater than a threshold amount. - In an example embodiment, an apparatus may include a controller, a memory coupled to the controller, and a wireless transceiver coupled to the controller. The apparatus may be configured to detect a residual traffic pattern associated with a mobile station in a wireless network, and transition the mobile station from an active state to a residual traffic state based on the detected residual traffic pattern. The transitioning may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type. The apparatus may be (or may be provided within) a base station or access point, a network controller, a gateway, or other infrastructure node.
-
FIG. 5 is a flow chart illustrating operation of a base station or other node according to an example embodiment.Operation 510 may include detecting an active traffic pattern associated with a mobile station.Operation 520 may include transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type. - In an example embodiment, the sending of
operation 520 may include sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type, the first UL service type providing unsolicited UL resource grants to the mobile station at periodic intervals, and the second UL service type providing resource grants to the mobile station upon solicitation or request from the mobile station. - In an example embodiment, the second UL service type of the flowchart of
FIG. 5 may include a Best Effort service type, and the first UL service type includes one of an extended real time polling service (Extended rtPS) or an uplink grant service (UGS). - In an example embodiment,
operation 510 may include detecting an amount of traffic to or from the mobile station over a period of time is greater than a threshold amount, or detecting an amount of active traffic to or from the mobile station over a period of time is greater than a threshold amount. - In another example embodiment, an apparatus may be provided. The apparatus may include a controller, a memory and a wireless transceiver. The apparatus may be configured to detect an active traffic pattern associated with a mobile station, transitioning the mobile station from a residual traffic state to an active state based on the detecting the active traffic pattern, including: sending a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type. In an example embodiment, the apparatus may be (or may be provided within) a base station, access point, a network controller or gateway, or other infrastructure node.
- In an example embodiment,
network controller 112 or gateway may control or coordinate a number of functions or tasks described above. For example,network controller 112 may detect a residual traffic pattern and transition the MS to residual traffic state, update UL service parameters, detect an active traffic state, and transition the MS back to active state, for example. These measurements bynetwork controller 112 may be based on data provided by the BS, or by the network controller receiving the wireless communications between BS and MS, for example. - According to another example embodiment, a mobile station may participate in a detection of a residual traffic pattern, state transitioning (e.g., transitioning to a residual traffic state), and adaptation of parameters (e.g., data rate, resource grant size, period or interval between resource grants) for an UL data service based on changing traffic load.
- In an example embodiment, the mobile station may measure its traffic load (e.g., traffic to or from the MS), an amount of data waiting in the MS's buffers for transmission, or other parameters that may indicate a residual traffic pattern or an active traffic pattern for the MS. The MS may detect a residual traffic pattern, and then send a state transition request to an infrastructure node (e.g., to a BS or network controller, gateway or other node). The infrastructure node may, for example, also measure traffic load to or from the MS, and may confirm that transitioning the MS to a residual traffic state would be appropriate. For example, a BS may make this decision (whether to transition the MS to residual traffic state) or may forward the state transition request to a gateway or network controller which would make this decision to transition the MS to a residual traffic state. The infrastructure node may then send a reply message confirming or instructing the MS to transition to a residual traffic state. This reply may be or may include, for example, a change uplink data service message instructing the MS to change UL data service from a first UL service type to a second UL service type. The infrastructure node (for example, a BS) may buffer data or packets directed to the MS while the MS is in a residual traffic state, and the MS may also buffer data to be transmitted while it is in a residual traffic state.
- Likewise, when traffic load increases for the MS, the MS may continue to measure traffic load, and continue to measure the amount of buffered data in its buffers awaiting transmission. When the amount of traffic load or amount of buffered traffic increases or decreases, the MS may send a request to the infrastructure node to or adjust (e.g., either increase or decrease) one or more parameters associated with the UL data service, or other communication parameters, e.g., to accommodate the changed traffic load at the MS.
- At some point, the MS may detect an active traffic pattern (e.g., where the amount of traffic to or from the MS and/or an amount of data in buffers awaiting transmission by the MS exceeds a threshold, or other active traffic pattern). In such case, the MS may send the infrastructure node a state transition request to request a transition back to active state for the MS. The infrastructure node may, for example, after confirming that such transition would be appropriate, may send a reply message confirming or instructing the MS to transition back to active state. In such case, the infrastructure node may send a change UL data service message instructing the MS to switch back to the first service type that may typically be used in an active state.
-
FIG. 7 is a flow chart illustrating operation of a wireless node, such as a mobile station according to an example embodiment. The method may include detecting (710), by a mobile station in a wireless network, a residual traffic pattern, sending (720), in response to the detecting, a state transition request from the mobile station to an infrastructure node to request a transition to a residual traffic state for the mobile station. The method may also include receiving (730) a message at the mobile station from the infrastructure node instructing the mobile station to enter a residual traffic state, and entering (740), by the mobile station, a residual traffic state. - For example, the detecting (710) may include detecting, by a mobile station, a residual traffic pattern associated with a mobile station in a wireless network comprises detecting an amount of traffic transmitted from or received by the mobile station is less than a threshold amount over a period of time. Also, the receiving (730) a message may include receiving a change uplink (UL) data service message to the mobile station to change the UL data service for the mobile station from a first UL service type to a second UL service type.
-
FIG. 6 is a block diagram of a wireless node according to an example embodiment. Thewireless node 600 may include awireless transceiver 602, and acontroller 604, and amemory 606. For example, some operations illustrated and/or described herein, may be performed by acontroller 604, under control of software or firmware. - In addition, a storage medium may be provided that includes stored instructions, which when executed by a controller or processor may result in a controller, or processor, performing one or more of the functions or tasks described above.
- Implementations of the various techniques described herein may be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Implementations may implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by, or to control the operation of, a data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program, such as the computer program(s) described above, can be written in any form of programming language, including compiled or interpreted languages, and can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
- Method steps may be performed by one or more programmable processors executing a computer program to perform functions by operating on input data and generating output. Method steps also may be performed by, and an apparatus may be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
- Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. Elements of a computer may include at least one processor for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer also may include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory may be supplemented by, or incorporated in, special purpose logic circuitry.
- To provide for interaction with a user, implementations may be implemented on a computer having a display device, e.g., a cathode ray tube (CRT) or liquid crystal display (LCD) monitor, for displaying information to the user and a keyboard and a pointing device, e.g., a mouse or a trackball, by which the user can provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.g., visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech, or tactile input.
- Implementations may be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a Web browser through which a user can interact with an implementation, or any combination of such back-end, middleware, or front-end components. Components may be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (LAN) and a wide area network (WAN), e.g., the Internet.
- While certain features of the described implementations have been illustrated as described herein, many modifications, substitutions, changes and equivalents will now occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the various embodiments.
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/947,748 US20090141661A1 (en) | 2007-11-29 | 2007-11-29 | Residual traffic state for wireless networks |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/947,748 US20090141661A1 (en) | 2007-11-29 | 2007-11-29 | Residual traffic state for wireless networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090141661A1 true US20090141661A1 (en) | 2009-06-04 |
Family
ID=40675610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/947,748 Abandoned US20090141661A1 (en) | 2007-11-29 | 2007-11-29 | Residual traffic state for wireless networks |
Country Status (1)
Country | Link |
---|---|
US (1) | US20090141661A1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080002608A1 (en) * | 2006-06-30 | 2008-01-03 | Haihong Zheng | QoS request and information distribution for wireless relay networks |
US20090201843A1 (en) * | 2008-02-13 | 2009-08-13 | Huaiyuan Wang | Using traffic patterns to improve sleep mode efficiency in a radio handset |
US20100003985A1 (en) * | 2008-07-01 | 2010-01-07 | Samsung Electronics Co. Ltd. | Apparatus and method for performing handover in wireless communication system |
US20100008242A1 (en) * | 2008-07-11 | 2010-01-14 | BECEEM Communications | Wireless subscriber uplink (UL) grant size selection |
US20100037113A1 (en) * | 2008-08-08 | 2010-02-11 | Qualcomm Incorporated | Utilizing harq for uplink grants received in wireless communications |
US20100040001A1 (en) * | 2008-08-12 | 2010-02-18 | Qualcomm Incorporated | Handling uplink grant in random access response |
US20100081767A1 (en) * | 2008-10-01 | 2010-04-01 | Fina Technology, Inc. | Articles Formed from Nucleated Polyethylene |
US20100111523A1 (en) * | 2008-11-05 | 2010-05-06 | Teknovus, Inc. | Epon with power-saving features |
US20110098020A1 (en) * | 2008-02-29 | 2011-04-28 | Koninklijke Kpn N.V. | Telecommunications Network and Method for Time-Based Network Access |
US20110269463A1 (en) * | 2010-04-30 | 2011-11-03 | Apple Inc. | Methods and apparatus for preserving battery resources in a mobile communication device |
KR101102356B1 (en) * | 2009-07-15 | 2012-01-03 | 한국과학기술원 | Method and Apparatus for Controlling Sleep Mode in Wireless Communication Networks |
US20130040683A1 (en) * | 2011-08-12 | 2013-02-14 | Telefonaktiebolaget L M Ericsson (Publ) | Systems and Methods For Determining a Coupling Characteristic in a Radio Communications Network |
US20130242836A1 (en) * | 2010-10-25 | 2013-09-19 | Broadcom Corporation | Transitioning from mimo to siso to save power |
US8665857B2 (en) | 2007-12-18 | 2014-03-04 | Qualcomm Incorporated | Method and apparatus for sending and receiving random access response in a wireless communication system |
CN103814540A (en) * | 2011-07-14 | 2014-05-21 | 瑞典爱立信有限公司 | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication network |
US20140269373A1 (en) * | 2013-03-14 | 2014-09-18 | Apple Inc. | Adaptive use of receiver diversity |
US20150163799A1 (en) * | 2013-12-10 | 2015-06-11 | Fujitsu Limited | Base station |
US20150195788A1 (en) * | 2014-01-08 | 2015-07-09 | Futurewei Technologies, Inc. | System and Method for Always on Connections in Wireless Communications System |
US20180077592A1 (en) * | 2016-09-09 | 2018-03-15 | Samsung Electronics Co., Ltd. | Network selection method and apparatus therefor |
US10432417B2 (en) * | 2017-12-14 | 2019-10-01 | Ademco Inc. | Systems and methods for transmitting an updated partition state to sensors or devices |
US11854329B2 (en) | 2019-05-24 | 2023-12-26 | Ademco Inc. | Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device |
Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5454026A (en) * | 1992-04-07 | 1995-09-26 | Nec Corporation | Mobile communication congestion control system |
US5966662A (en) * | 1994-06-28 | 1999-10-12 | Nokia Telecommunications Oy | Subscriber paging control in a mobile communication system |
US6002918A (en) * | 1989-06-29 | 1999-12-14 | Symbol Technologies, Inc. | Power-saving arrangement and method for mobile units in communications network |
US6295294B1 (en) * | 1997-08-07 | 2001-09-25 | At&T Corp. | Technique for limiting network congestion |
US6463307B1 (en) * | 1998-08-14 | 2002-10-08 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for power saving in a mobile terminal with established connections |
US6490271B1 (en) * | 1998-09-16 | 2002-12-03 | Nokia Mobile Phones | Method and apparatus for dynamic radio resource controlling |
US6571101B1 (en) * | 1998-10-19 | 2003-05-27 | Siemens Aktiengesellschaft | Method and radio communications system for controlling signaling |
US20030154488A1 (en) * | 2002-02-13 | 2003-08-14 | Jay Strater | Method and apparatus for reserving and releasing bandwidth for a packet-switched telephony connection established over an HFC cable network |
US20030156554A1 (en) * | 2000-04-11 | 2003-08-21 | Markus Dillinger | Method for regulating transmission power in a radiocommunications system |
US20030210658A1 (en) * | 2002-05-08 | 2003-11-13 | Microsoft Corporation | Method and system for managing power consumption of a network interface module in a wireless computing device |
US20040017795A1 (en) * | 2002-07-24 | 2004-01-29 | Abraham Santosh P. | Dynamic DCH allocation methodology for packet data services in a wireless communications system |
US20040090929A1 (en) * | 2002-11-12 | 2004-05-13 | Cisco Technology, Inc. | Method and apparatus for supporting user mobility in a communication system |
US20040127214A1 (en) * | 2002-10-01 | 2004-07-01 | Interdigital Technology Corporation | Wireless communication method and system with controlled WTRU peer-to-peer communications |
US20040156329A1 (en) * | 2001-02-21 | 2004-08-12 | Baeck Juha | Communication system comprising a plurality of communication networks |
US20040264421A1 (en) * | 2003-06-26 | 2004-12-30 | Hirofumi Sato | Cell station, radio communication system, communication control method of cell station, and method of building radio communication network |
US20050013316A1 (en) * | 2003-07-14 | 2005-01-20 | Siemens Technology -To-Business Center Llc. | Method and apparatus for providing a delay guarantee for a wireless network |
US20050076244A1 (en) * | 2003-10-01 | 2005-04-07 | Nec Corporation | Control method for wireless communication system, wireless communicaction device, base station, and authentication device in communication system |
US6970726B2 (en) * | 2001-07-23 | 2005-11-29 | Nec Corporation | Mobile station having short-range radio function and power consumption reduction method therefor |
US7003332B2 (en) * | 2002-10-17 | 2006-02-21 | Harris Corporation | Method and system for decreasing power-on time for software-defined radios |
US20060039313A1 (en) * | 2004-08-17 | 2006-02-23 | Joey Chou | Method and system of network management and service provisioning for broadband wireless networks |
US20060077922A1 (en) * | 2003-03-21 | 2006-04-13 | Siemens Aktiengesellschaft | System method & apparatus for routing traffic in a telecommunications network |
US20060098643A1 (en) * | 2004-11-05 | 2006-05-11 | Howard Pfeffer | System and method for providing premium transport in a DOCSIS-compliant cable network |
US20060149845A1 (en) * | 2004-12-30 | 2006-07-06 | Xinnia Technology, Llc | Managed quality of service for users and applications over shared networks |
US20060252449A1 (en) * | 2005-04-26 | 2006-11-09 | Sridhar Ramesh | Methods and apparatus to provide adaptive power save delivery modes in wireless local area networks (LANs) |
US7142525B2 (en) * | 2001-11-14 | 2006-11-28 | Kabushiki Kaisha Toshiba | Data transmission system |
US20060268764A1 (en) * | 2005-05-26 | 2006-11-30 | Harris John M | Method, apparatus and system for use in allocating reverse channel resources |
US20070058544A1 (en) * | 2005-07-19 | 2007-03-15 | Samsung Electronics Co., Ltd. | Apparatus and method for scheduling data in a communication system |
US20070097945A1 (en) * | 2005-10-27 | 2007-05-03 | Wang Guo Q | Methods and systems for a wireless routing architecture and protocol |
US20070116051A1 (en) * | 2005-11-23 | 2007-05-24 | Chen An M | Method and apparatus for transporting IP datagrams over FLO network |
US20070135080A1 (en) * | 2005-12-14 | 2007-06-14 | Research In Motion Limited | Method and apparatus for user equipment directed radio resource control in a UMTS network |
US20070211726A1 (en) * | 2006-03-13 | 2007-09-13 | Randy Kuang | WiMAX intra-ASN service flow ID mobility |
US20070248071A1 (en) * | 2006-04-25 | 2007-10-25 | Hui Jonathan W | System and method for low power radio operation in a wireless packet network |
US20080002608A1 (en) * | 2006-06-30 | 2008-01-03 | Haihong Zheng | QoS request and information distribution for wireless relay networks |
US20080049703A1 (en) * | 2006-08-28 | 2008-02-28 | Nokia Corporation | Multicast-only data transmission mode for access points and virtual access points in a wireless network |
US20080069021A1 (en) * | 2006-09-14 | 2008-03-20 | Kapil Chhabra | Ad-hoc network power save system and method |
US7349356B2 (en) * | 2001-11-07 | 2008-03-25 | Symbol Technologies, Inc. | Power saving function for wireless LANs: methods, system and program products |
US20080192763A1 (en) * | 2007-02-09 | 2008-08-14 | Cisco Technology, Inc. | Network discovery and dynamic adaptation of insufficient qos resources |
US20080261663A1 (en) * | 2007-04-18 | 2008-10-23 | Minyoung Park | Methods and arrangements for adaptively changing snoozing intervals of wireless devices |
US20090046641A1 (en) * | 2007-08-13 | 2009-02-19 | Interdigital Patent Holdings, Inc. | Long term evolution medium access control procedures |
US7508778B2 (en) * | 2001-12-05 | 2009-03-24 | Qualcomm, Incorporated | System and method for adjusting quality of service in a communication system |
US7570976B2 (en) * | 2004-05-14 | 2009-08-04 | Research In Motion Limited | Methods and apparatus for expeditiously releasing network resources for a mobile station based on low battery and lost signal conditions |
US7653086B2 (en) * | 2001-10-31 | 2010-01-26 | Juniper Networks, Inc. | Context-dependent scheduling through the use of anticipated grants for broadband communication systems |
US20100040013A1 (en) * | 2005-10-13 | 2010-02-18 | Daigo Takayanagi | Wireless communication system and base station |
-
2007
- 2007-11-29 US US11/947,748 patent/US20090141661A1/en not_active Abandoned
Patent Citations (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002918A (en) * | 1989-06-29 | 1999-12-14 | Symbol Technologies, Inc. | Power-saving arrangement and method for mobile units in communications network |
US5454026A (en) * | 1992-04-07 | 1995-09-26 | Nec Corporation | Mobile communication congestion control system |
US5966662A (en) * | 1994-06-28 | 1999-10-12 | Nokia Telecommunications Oy | Subscriber paging control in a mobile communication system |
US6295294B1 (en) * | 1997-08-07 | 2001-09-25 | At&T Corp. | Technique for limiting network congestion |
US6463307B1 (en) * | 1998-08-14 | 2002-10-08 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for power saving in a mobile terminal with established connections |
US6490271B1 (en) * | 1998-09-16 | 2002-12-03 | Nokia Mobile Phones | Method and apparatus for dynamic radio resource controlling |
US6571101B1 (en) * | 1998-10-19 | 2003-05-27 | Siemens Aktiengesellschaft | Method and radio communications system for controlling signaling |
US20030156554A1 (en) * | 2000-04-11 | 2003-08-21 | Markus Dillinger | Method for regulating transmission power in a radiocommunications system |
US20040156329A1 (en) * | 2001-02-21 | 2004-08-12 | Baeck Juha | Communication system comprising a plurality of communication networks |
US6970726B2 (en) * | 2001-07-23 | 2005-11-29 | Nec Corporation | Mobile station having short-range radio function and power consumption reduction method therefor |
US7653086B2 (en) * | 2001-10-31 | 2010-01-26 | Juniper Networks, Inc. | Context-dependent scheduling through the use of anticipated grants for broadband communication systems |
US7349356B2 (en) * | 2001-11-07 | 2008-03-25 | Symbol Technologies, Inc. | Power saving function for wireless LANs: methods, system and program products |
US7142525B2 (en) * | 2001-11-14 | 2006-11-28 | Kabushiki Kaisha Toshiba | Data transmission system |
US7508778B2 (en) * | 2001-12-05 | 2009-03-24 | Qualcomm, Incorporated | System and method for adjusting quality of service in a communication system |
US20030154488A1 (en) * | 2002-02-13 | 2003-08-14 | Jay Strater | Method and apparatus for reserving and releasing bandwidth for a packet-switched telephony connection established over an HFC cable network |
US20030210658A1 (en) * | 2002-05-08 | 2003-11-13 | Microsoft Corporation | Method and system for managing power consumption of a network interface module in a wireless computing device |
US20040017795A1 (en) * | 2002-07-24 | 2004-01-29 | Abraham Santosh P. | Dynamic DCH allocation methodology for packet data services in a wireless communications system |
US20040127214A1 (en) * | 2002-10-01 | 2004-07-01 | Interdigital Technology Corporation | Wireless communication method and system with controlled WTRU peer-to-peer communications |
US7003332B2 (en) * | 2002-10-17 | 2006-02-21 | Harris Corporation | Method and system for decreasing power-on time for software-defined radios |
US20040090929A1 (en) * | 2002-11-12 | 2004-05-13 | Cisco Technology, Inc. | Method and apparatus for supporting user mobility in a communication system |
US20060077922A1 (en) * | 2003-03-21 | 2006-04-13 | Siemens Aktiengesellschaft | System method & apparatus for routing traffic in a telecommunications network |
US20040264421A1 (en) * | 2003-06-26 | 2004-12-30 | Hirofumi Sato | Cell station, radio communication system, communication control method of cell station, and method of building radio communication network |
US20050013316A1 (en) * | 2003-07-14 | 2005-01-20 | Siemens Technology -To-Business Center Llc. | Method and apparatus for providing a delay guarantee for a wireless network |
US20050076244A1 (en) * | 2003-10-01 | 2005-04-07 | Nec Corporation | Control method for wireless communication system, wireless communicaction device, base station, and authentication device in communication system |
US7570976B2 (en) * | 2004-05-14 | 2009-08-04 | Research In Motion Limited | Methods and apparatus for expeditiously releasing network resources for a mobile station based on low battery and lost signal conditions |
US20060039313A1 (en) * | 2004-08-17 | 2006-02-23 | Joey Chou | Method and system of network management and service provisioning for broadband wireless networks |
US20060098643A1 (en) * | 2004-11-05 | 2006-05-11 | Howard Pfeffer | System and method for providing premium transport in a DOCSIS-compliant cable network |
US20060149845A1 (en) * | 2004-12-30 | 2006-07-06 | Xinnia Technology, Llc | Managed quality of service for users and applications over shared networks |
US20060252449A1 (en) * | 2005-04-26 | 2006-11-09 | Sridhar Ramesh | Methods and apparatus to provide adaptive power save delivery modes in wireless local area networks (LANs) |
US20060268764A1 (en) * | 2005-05-26 | 2006-11-30 | Harris John M | Method, apparatus and system for use in allocating reverse channel resources |
US20070058544A1 (en) * | 2005-07-19 | 2007-03-15 | Samsung Electronics Co., Ltd. | Apparatus and method for scheduling data in a communication system |
US20100040013A1 (en) * | 2005-10-13 | 2010-02-18 | Daigo Takayanagi | Wireless communication system and base station |
US20070097945A1 (en) * | 2005-10-27 | 2007-05-03 | Wang Guo Q | Methods and systems for a wireless routing architecture and protocol |
US20070116051A1 (en) * | 2005-11-23 | 2007-05-24 | Chen An M | Method and apparatus for transporting IP datagrams over FLO network |
US20070135080A1 (en) * | 2005-12-14 | 2007-06-14 | Research In Motion Limited | Method and apparatus for user equipment directed radio resource control in a UMTS network |
US20070211726A1 (en) * | 2006-03-13 | 2007-09-13 | Randy Kuang | WiMAX intra-ASN service flow ID mobility |
US20070248071A1 (en) * | 2006-04-25 | 2007-10-25 | Hui Jonathan W | System and method for low power radio operation in a wireless packet network |
US20080002608A1 (en) * | 2006-06-30 | 2008-01-03 | Haihong Zheng | QoS request and information distribution for wireless relay networks |
US20080049703A1 (en) * | 2006-08-28 | 2008-02-28 | Nokia Corporation | Multicast-only data transmission mode for access points and virtual access points in a wireless network |
US20080069021A1 (en) * | 2006-09-14 | 2008-03-20 | Kapil Chhabra | Ad-hoc network power save system and method |
US20080192763A1 (en) * | 2007-02-09 | 2008-08-14 | Cisco Technology, Inc. | Network discovery and dynamic adaptation of insufficient qos resources |
US20080261663A1 (en) * | 2007-04-18 | 2008-10-23 | Minyoung Park | Methods and arrangements for adaptively changing snoozing intervals of wireless devices |
US20090046641A1 (en) * | 2007-08-13 | 2009-02-19 | Interdigital Patent Holdings, Inc. | Long term evolution medium access control procedures |
Cited By (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8483123B2 (en) | 2006-06-30 | 2013-07-09 | Nokia Corporation | QoS request and information distribution for wireless relay networks |
US20080002608A1 (en) * | 2006-06-30 | 2008-01-03 | Haihong Zheng | QoS request and information distribution for wireless relay networks |
US8665857B2 (en) | 2007-12-18 | 2014-03-04 | Qualcomm Incorporated | Method and apparatus for sending and receiving random access response in a wireless communication system |
US8111642B2 (en) * | 2008-02-13 | 2012-02-07 | Sony Ericsson Mobile Communications Ab | Using traffic patterns to improve sleep mode efficiency in a radio handset |
US20090201843A1 (en) * | 2008-02-13 | 2009-08-13 | Huaiyuan Wang | Using traffic patterns to improve sleep mode efficiency in a radio handset |
US9253637B2 (en) | 2008-02-29 | 2016-02-02 | Koninklijke Kpn N.V. | Telecommunications network and method for time-based network access |
US9014667B2 (en) * | 2008-02-29 | 2015-04-21 | Koninklijke Kpn N.V. | Telecommunications network and method for time-based network access |
US9247426B2 (en) | 2008-02-29 | 2016-01-26 | Koninklijke Kpn N.V. | Telecommunications network and method for time-based network access |
US20110098020A1 (en) * | 2008-02-29 | 2011-04-28 | Koninklijke Kpn N.V. | Telecommunications Network and Method for Time-Based Network Access |
US10187904B2 (en) | 2008-02-29 | 2019-01-22 | Koninklijke Kpn N.V. | Telecommunications network and method for time-based network access |
US9781743B2 (en) | 2008-02-29 | 2017-10-03 | Koninklijke Kpn N.V. | Telecommunications network and method for time-based network access |
US20100003985A1 (en) * | 2008-07-01 | 2010-01-07 | Samsung Electronics Co. Ltd. | Apparatus and method for performing handover in wireless communication system |
US9185608B2 (en) * | 2008-07-01 | 2015-11-10 | Samsung Electronics Co., Ltd. | Apparatus and method for performing handover in wireless communication system |
US8300544B2 (en) * | 2008-07-11 | 2012-10-30 | Broadcom Corporation | Wireless subscriber uplink (UL) grant size selection |
US20130010625A1 (en) * | 2008-07-11 | 2013-01-10 | Broadcom Corporation | Wireless subscriber uplink (ul) grant size selection |
US20100008242A1 (en) * | 2008-07-11 | 2010-01-14 | BECEEM Communications | Wireless subscriber uplink (UL) grant size selection |
US20100037113A1 (en) * | 2008-08-08 | 2010-02-11 | Qualcomm Incorporated | Utilizing harq for uplink grants received in wireless communications |
US9094202B2 (en) | 2008-08-08 | 2015-07-28 | Qualcomm Incorporated | Utilizing HARQ for uplink grants received in wireless communications |
US9591668B2 (en) * | 2008-08-12 | 2017-03-07 | Qualcomm Incorporated | Method and apparatus for handling uplink grant in random access response |
US20130163549A1 (en) * | 2008-08-12 | 2013-06-27 | Qualcomm Incorporated | Method and apparatus for handling uplink grant in random access response |
US8780816B2 (en) * | 2008-08-12 | 2014-07-15 | Qualcomm Incorporated | Handling uplink grant in random access response |
US20100040001A1 (en) * | 2008-08-12 | 2010-02-18 | Qualcomm Incorporated | Handling uplink grant in random access response |
US20100081767A1 (en) * | 2008-10-01 | 2010-04-01 | Fina Technology, Inc. | Articles Formed from Nucleated Polyethylene |
US8498534B2 (en) * | 2008-11-05 | 2013-07-30 | Broadcom Corporation | Epon with power-saving features |
US20100111523A1 (en) * | 2008-11-05 | 2010-05-06 | Teknovus, Inc. | Epon with power-saving features |
US8744261B2 (en) | 2008-11-05 | 2014-06-03 | Broadcom Corporation | EPON with power-saving features |
KR101102356B1 (en) * | 2009-07-15 | 2012-01-03 | 한국과학기술원 | Method and Apparatus for Controlling Sleep Mode in Wireless Communication Networks |
TWI455634B (en) * | 2010-04-30 | 2014-10-01 | Apple Inc | Methods and apparatus for preserving battery resources in a mobile communication device |
KR101350569B1 (en) | 2010-04-30 | 2014-01-23 | 애플 인크. | Methods and apparatus for preserving battery resources in a mobile communication device |
US8744534B2 (en) * | 2010-04-30 | 2014-06-03 | Apple Inc. | Methods and apparatus for preserving battery resources in a mobile communication device |
US20110269463A1 (en) * | 2010-04-30 | 2011-11-03 | Apple Inc. | Methods and apparatus for preserving battery resources in a mobile communication device |
WO2011137128A1 (en) * | 2010-04-30 | 2011-11-03 | Apple Inc. | Methods and apparatus for preserving battery resources in a mobile communication device |
CN102870145A (en) * | 2010-04-30 | 2013-01-09 | 苹果公司 | Methods and apparatus for preserving battery resources in a mobile communication device |
AU2011245386B2 (en) * | 2010-04-30 | 2014-05-15 | Apple Inc. | Methods and apparatus for preserving battery resources in a mobile communication device |
US9756569B2 (en) | 2010-10-25 | 2017-09-05 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Transitioning from MIMO to SISO to save power |
US20130242836A1 (en) * | 2010-10-25 | 2013-09-19 | Broadcom Corporation | Transitioning from mimo to siso to save power |
US9144025B2 (en) * | 2010-10-25 | 2015-09-22 | Broadcom Corporation | Transitioning from MIMO to SISO to save power |
US11012937B2 (en) | 2011-07-14 | 2021-05-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication networks |
US11463954B2 (en) | 2011-07-14 | 2022-10-04 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication networks |
US10575252B2 (en) | 2011-07-14 | 2020-02-25 | Telefonaktiebolaget L M Ericsson (Publ) | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication networks |
US9661572B2 (en) | 2011-07-14 | 2017-05-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication networks |
US10743256B2 (en) | 2011-07-14 | 2020-08-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication networks |
CN103814540A (en) * | 2011-07-14 | 2014-05-21 | 瑞典爱立信有限公司 | Methods and apparatuses for efficient battery utilization during content delivery in telecommunication network |
US20130040683A1 (en) * | 2011-08-12 | 2013-02-14 | Telefonaktiebolaget L M Ericsson (Publ) | Systems and Methods For Determining a Coupling Characteristic in a Radio Communications Network |
US9179363B2 (en) * | 2011-08-12 | 2015-11-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods for determining a coupling characteristic in a radio communications network |
US9226175B2 (en) * | 2013-03-14 | 2015-12-29 | Apple Inc. | Adaptive use of receiver diversity |
US20140269373A1 (en) * | 2013-03-14 | 2014-09-18 | Apple Inc. | Adaptive use of receiver diversity |
US10110294B2 (en) | 2013-03-14 | 2018-10-23 | Apple Inc. | Adaptive use of receiver diversity |
US9635623B2 (en) * | 2013-12-10 | 2017-04-25 | Fujitsu Limited | Base station |
US20150163799A1 (en) * | 2013-12-10 | 2015-06-11 | Fujitsu Limited | Base station |
US20190037501A1 (en) * | 2014-01-08 | 2019-01-31 | Huawei Technologies Co., Ltd. | System and Method for Always On Connections in Wireless Communications System |
US20190045448A1 (en) * | 2014-01-08 | 2019-02-07 | Huawei Technologies Co., Ltd. | System and Method for Always On Connections in Wireless Communications System |
US20190045449A1 (en) * | 2014-01-08 | 2019-02-07 | Huawei Technologies Co., Ltd. | System and Method for Always On Connections in Wireless Communications System |
US11012939B2 (en) * | 2014-01-08 | 2021-05-18 | Huawei Technologies Co., Ltd. | System and method for always on connections in wireless communications system |
US11012940B2 (en) * | 2014-01-08 | 2021-05-18 | Huawei Technologies Co., Ltd. | System and method for always on connections in wireless communications system |
US20150195788A1 (en) * | 2014-01-08 | 2015-07-09 | Futurewei Technologies, Inc. | System and Method for Always on Connections in Wireless Communications System |
US11019570B2 (en) * | 2014-01-08 | 2021-05-25 | Huawei Technologies Co., Ltd. | System and method for always on connections in wireless communications system |
US11259246B2 (en) * | 2014-01-08 | 2022-02-22 | Huawei Technologies Co., Ltd. | System and method for always on connections in wireless communications system |
CN105981413A (en) * | 2014-01-08 | 2016-09-28 | 华为技术有限公司 | System and method for always on connections in wireless communications system |
US10667153B2 (en) * | 2016-09-09 | 2020-05-26 | Samsung Electronics Co., Ltd. | Network selection method and apparatus therefor |
US20180077592A1 (en) * | 2016-09-09 | 2018-03-15 | Samsung Electronics Co., Ltd. | Network selection method and apparatus therefor |
US10432417B2 (en) * | 2017-12-14 | 2019-10-01 | Ademco Inc. | Systems and methods for transmitting an updated partition state to sensors or devices |
US11854329B2 (en) | 2019-05-24 | 2023-12-26 | Ademco Inc. | Systems and methods for authorizing transmission of commands and signals to an access control device or a control panel device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20090141661A1 (en) | Residual traffic state for wireless networks | |
EP2002673B1 (en) | A method for data transfer with a mobile station while in discontinuous reception state | |
US9338674B2 (en) | Systems, structures and associated processes for optimization of state transitions within wireless networks | |
US9363755B2 (en) | Power saving modes in wireless devices | |
KR101122877B1 (en) | Method and apparatus for managing power in network interface modules | |
US8797911B2 (en) | Method and apparatus for reducing power consumption in a wireless communication device | |
US8542610B2 (en) | Adaptive power saving for a mobile subscriber unit in a wireless communication network | |
US8606290B2 (en) | Method and apparatus for performing a demotion in a cellular communications network | |
EP2880895B1 (en) | Signal-aware data transfer in cellular networks | |
US20050129009A1 (en) | Power saving in a wireless local area network | |
US20070230418A1 (en) | Triggering rule for energy efficient data delivery | |
JP2016536852A (en) | Power savings with adaptive inactivity timeout | |
US20110038311A1 (en) | Coordinating operation in infrastructure and ad-hoc modes for wireless networks | |
EP3787351A1 (en) | Extending active state based on adaptation | |
Peck et al. | A practical PSM scheme for varying server delay | |
KR100705442B1 (en) | Sleep Mode Method and Mobile Station Using Thereof | |
CN107548143B (en) | Message sending and receiving method and device, wireless access equipment and terminal equipment | |
CN112333197B (en) | Data transmission method and system, user equipment and storage medium | |
KR20190019957A (en) | Adaptive inactivity timeout management | |
KR100735775B1 (en) | Mobile communication terminal having a sleep mode control function and controlling method therefore | |
MX2008010220A (en) | A method for aperiodic mobile assisted sleep mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NOKIA SIEMENS NETWORKS, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LI, ZEXIAN;PANDEY, RAVI;PICHNA, ROMAN;REEL/FRAME:020471/0474;SIGNING DATES FROM 20071130 TO 20071204 Owner name: NOKIA CORPORATION, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LI, ZEXIAN;PANDEY, RAVI;PICHNA, ROMAN;REEL/FRAME:020471/0474;SIGNING DATES FROM 20071130 TO 20071204 |
|
AS | Assignment |
Owner name: NOKIA SIEMENS NETWORKS OY, FINLAND Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:021797/0942 Effective date: 20080926 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |